• Title/Summary/Keyword: Weakness Rule

Search Result 36, Processing Time 0.02 seconds

Design of PID adaptive control system combining Genetic Algorithms and Neural Network (유전알고리즘과 신경망을 결합한 PID 적응제어 시스템의 설계)

  • 조용갑;박재형;박윤명;서현재;최부귀
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.1
    • /
    • pp.105-111
    • /
    • 1999
  • This Paper is about how to deside the best parameter of PID controller, using Genetic Algorithms and Neural Networks. Control by Genetic Algorithms, which is off-line pass, has weakness for disturbance. So we want to improve like followings by adding Neural Network to controller and putting it on line. First we find PID parameter by Genetic Algorithms in forward pass of Neural Network and set the best output condition according to the increasing number of generation. Second, we explain the adaptability for disturbance with simulation by correcting parameter by backpropagation learning rule by using the learning ability of Neural Network.

  • PDF

Numerical Analysis of Deformation Behaviour of Underground Opening in a Discontinuous Rock Mass Using a Continuum Joint Model (연속체 절리모델을 이용한 불연속성암반 내 지하공동의 변형거동에 관한 수치해석)

  • Kang Sang Soo;Lee Jong-Kil;Baek Hwanjo
    • The Journal of Engineering Geology
    • /
    • v.15 no.3
    • /
    • pp.257-268
    • /
    • 2005
  • In situ rock mass is generally heterogeneous and discontinuous, with varying degrees of strength along the planes of weakness. The planes of weakness such as joints, faults, cracks and bedding planes, control the strength and deformation characteristics of the rock mass. Subsequently, the stability of underground opening depends upon the spatial distribution of discontinuities and their mechanical properties in relation with geometrical shape of openins as well as the mechanical properties of intact rock materials. Understanding the behaviour of a discontinuous rock mass remains a key issue for improving excavation design in hiかy stressed environments. Although recent advances in rock mechanics have provided guidelines for the design of underground opening in isotropic rock mass, prediction and control of deformation in discontinuous rock masses are still unclear. In this study, parametric study was performed to investigate the plastic zone size, stress distribution and deformation behavior around underground opening in a discontinuous rock mass using a continuum joint model. The solutions were obtained by an elasto-plastic finite difference analysis, employing the Mohr-Coulomb failure criteria. Non-associated flow rule and perfectly plastic material behavior are also assumed.

Voice Activity Detection using Motion and Variation of Intensity in The Mouth Region (입술 영역의 움직임과 밝기 변화를 이용한 음성구간 검출 알고리즘 개발)

  • Kim, Gi-Bak;Ryu, Je-Woong;Cho, Nam-Ik
    • Journal of Broadcast Engineering
    • /
    • v.17 no.3
    • /
    • pp.519-528
    • /
    • 2012
  • Voice activity detection (VAD) is generally conducted by extracting features from the acoustic signal and a decision rule. The performance of such VAD algorithms driven by the input acoustic signal highly depends on the acoustic noise. When video signals are available as well, the performance of VAD can be enhanced by using the visual information which is not affected by the acoustic noise. Previous visual VAD algorithms usually use single visual feature to detect the lip activity, such as active appearance models, optical flow or intensity variation. Based on the analysis of the weakness of each feature, we propose to combine intensity change measure and the optical flow in the mouth region, which can compensate for each other's weakness. In order to minimize the computational complexity, we develop simple measures that avoid statistical estimation or modeling. Specifically, the optical flow is the averaged motion vector of some grid regions and the intensity variation is detected by simple thresholding. To extract the mouth region, we propose a simple algorithm which first detects two eyes and uses the profile of intensity to detect the center of mouth. Experiments show that the proposed combination of two simple measures show higher detection rates for the given false positive rate than the methods that use a single feature.

China's Global Investment Policy and Precondition for China Money FDI in Korea (중국의 해외투자 정책과 중국자본 유치의 전제조건)

  • Park, Moon-Suh;Kim, Mea-Jung
    • International Commerce and Information Review
    • /
    • v.14 no.1
    • /
    • pp.171-195
    • /
    • 2012
  • This paper is aimed to prepare some policy-measures which is helpful for China Money FDI in Korea by analysing FDI-related data and political strength and weakness between the two countries and studying fundamental preconditions required for Korea's China Money FDI strategies. As the result of research, key preconditions found out can be summarized as follows; First, because China-Korea economic relationship is largely insufficient in a complementary view as well as in a cooperative state level, Korea should remove the threats in advance that could lead two countries to unlimited competition, and then expand to a relationship of trust between China and Korea. Second, Korea, at least from the perspective of China, may not be an attractive investment destination. Therefore, it is necessary to take advantage of Korea's FTA-expansion-strategy opportunities such as Korea-US FTA which has entered into force recently. Third, because China always has a lot of alternative investment opportunities among world instead of Korea, so Korea should not overlook the fact that China has the bargaining power in large part related on the investment conditions in Korea, such as investment field, investment size, how to invest China Money to Korea, etc. Fourth, if Korea's FDI policy is trapped in the existing rules of the political frame, and moreover Korea can not have the role of rule breaker, it will be difficult to expect Korea's China Money FDI results compared to those efforts. Fifth, if Korea will execute China Money FDI strategies in the context of overestimating the China Power or China Money, it should be noted that Korea may have unexpected losses lead to a national by reason of outward and quantitative investment or bad investment.

  • PDF

0Does Unilateral Mastectomy Cause Scoliosis? (일측성 유방절제술이 척추측만증을 일으키는가?)

  • Lee, Sung Wook;Lee, Taik Jong;Lee, Sung Wo
    • Archives of Plastic Surgery
    • /
    • v.35 no.3
    • /
    • pp.279-282
    • /
    • 2008
  • Purpose: It is known that the chronic absence of unilateral breast can cause spine curvature. The artificial breast manufactures take up the position of that possibility. This study was designed to evaluate the influence of the mastectomy on the spine and appearance of scoliosis among women who wanted delayed breast reconstruction. ted delayed breast reconstruction. Methods: The study population consisted of 47 women who underwent delayed breast reconstruction at our Department of Plastic Surgery from April 2001 to May 2007. The whole spine anteroposterior and lateral X-ray was taken to evaluate the Cobb's angle. As a general rule a Cobb angle of 10 is regarded as a minimum angulation to define scoliosis. We evaluated Cobb's angle and drew a correlation between the duration of the mastectomy state and the weight of the mastectomy specimen. Results: There were no family history of scoliosis, and no numbness or weakness in the upper or lower extremities. They had normal reflex and experienced no tenderness of the perispinal area. The Spearman Correlation Coefficient between Cobb's angle and the period that took time from the mastectomy to the X-rays and analysis between Cobb's angle and specimen weight was 0.032 and-0.115. there were no correlation between Cobb's angle and time, or between Cobb's angle and specimen weight. Conclusion: lthough the patients attribute their back pain and distorted posture to having received an one-sided mastectomy, it is unlikely that one-sided mastectomy causes spinal deformity and scoliosis.

Ordinal Variable Selection in Decision Trees (의사결정나무에서 순서형 분리변수 선택에 관한 연구)

  • Kim Hyun-Joong
    • The Korean Journal of Applied Statistics
    • /
    • v.19 no.1
    • /
    • pp.149-161
    • /
    • 2006
  • The most important component in decision tree algorithm is the rule for split variable selection. Many earlier algorithms such as CART and C4.5 use greedy search algorithm for variable selection. Recently, many methods were developed to cope with the weakness of greedy search algorithm. Most algorithms have different selection criteria depending on the type of variables: continuous or nominal. However, ordinal type variables are usually treated as continuous ones. This approach did not cause any trouble for the methods using greedy search algorithm. However, it may cause problems for the newer algorithms because they use statistical methods valid for continuous or nominal types only. In this paper, we propose a ordinal variable selection method that uses Cramer-von Mises testing procedure. We performed comparisons among CART, C4.5, QUEST, CRUISE, and the new method. It was shown that the new method has a good variable selection power for ordinal type variables.

Composition and Contents of the Monograph on Theory of Cold Damage - "Sanghankyeongheombangyochal"(傷寒經驗方要撮) in the Late Joseon Dynasty (조선후기(朝鮮後期) 상한(傷寒) 연구(硏究)의 일면(一面) - 조선후기(朝鮮後期) 상한(傷寒) 연구서(硏究書) "상한경험방요촬(傷寒經驗方要撮)"의 구성과 내용 -)

  • Oh, Jun-Ho;Park, Sang-Young;Kim, Hyun-Koo;Kwon, Oh-Min
    • Korean Journal of Oriental Medicine
    • /
    • v.18 no.1
    • /
    • pp.25-34
    • /
    • 2012
  • Objective : This study was carried out with focus on written by Joh, Taek-seung (曺澤承) and Joh, Byeong-who(曺秉矦) in the relation of father and son in 1933. This book is a medical book including rare data, which has never been reported to academic circles all this while. Method : First, this study looked into the authors of this book and its history of publication. Further, this study analyzed the composition and contents of this book. Lastly, this study summed up the meaning of this book from the standpoint of medical history. Result : The authors were Confucian doctors who were active in the latter era of the Joseon Dynasty and also in the period of Japanese colonial rule. They lived in Haenam district of Jeonlanam-do, and cured its neighboring local residents while studying. They published the book of by putting together their own medical experiences. The authors suggested their remedial prescription according to gender and age whereas Zhang Zhongjing(張仲景) suggested the remedial prescription according to Six-Meridian Pattern Identification & Syndrome Differentiation(六經辨證). In addition, the authors of gave weight to the relationship with internal damage. Additionally, the authors not only thought much of the relationship between internal damage and external damage but also thought of the weakness and strength of the healthy qi, and the new and the old of a disease as an important clue to medical treatment. It seems that such contents was influenced by (東醫寶鑑). Conclusion : shows the results of the research on which was spontaneously conducted in Joseon.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Agent Based Process Management Environment (에이전트 기반의 프로세스 관리 환경에 관한 연구)

  • Kim, Jeong-Ah;Choi, Seung-Young;Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.691-698
    • /
    • 2006
  • The companies need the enterprise-wide support environment to build the competency to gather VOM(Voice of Market) in the process of preparing and implementing the strategy and to help establishing and managing the business process in order to secure the continuous competitive edge The enterprise-wide support environment to establish, operate, improve and evaluate the business process must be carried out. In this paper we define the method to define process and business rule in order to enable accurate execution of the process. Furthermore, collection and refection of accurate data concerning the competency of individuals, the subjects of the process execution, allows prevention of weakness of the process execution result and is the basis for identifying the areas of improvement. Therefore, high visibility can be attained through the work knowledge and processes presented in rules, and it can help firmly establish the process centered work culture (or system) in the organization by process improvement strictly based on data.

Improvement of User Recognition Rate using Multi-modal Biometrics (다중생체인식 기법을 이용한사용자 인식률 향상)

  • Geum, Myung-Hwan;Lee, Kyu-Won;Lee, Bong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1456-1462
    • /
    • 2008
  • In general, it is known a single biometric-based personal authentication has limitation to improve recognition rate due to weakness of individual recognition scheme. The recognition rate of face recognition system can be reduced by environmental factor such as illumination, while speaker verification system does not perform well with added surrounding noise. In this paper, a multi-modal biometric system composed of face and voice recognition system is proposed in order to improve the performance of the individual authentication system. The proposed empirical weight sum rule based on the reliability of the individual authentication system is applied to improve the performance of multi-modal biometrics. Since the proposed system is implemented using JAVA applet with security function, it can be utilized in the field of user authentication on the generic Web.